SB2021040906 - Multiple vulnerabilities in Rukovoditel Project Management App



SB2021040906 - Multiple vulnerabilities in Rukovoditel Project Management App

Published: April 9, 2021

Security Bulletin ID SB2021040906
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) SQL injection (CVE-ID: CVE-2020-13591)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the "access_rules/rules_form" page. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

Note: An attacker either needs administrator privileges or they could trigger this vulnerability through cross-site request forgery.


2) SQL injection (CVE-ID: CVE-2020-13587)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the "forms_fields_rules/rules" page. A remote attacker can send a specially crafted HTTP request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

Note: An attacker either needs administrator privileges or they could trigger this vulnerability through cross-site request forgery.


3) SQL injection (CVE-ID: CVE-2020-13592)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the "lists_id" parameter in "global_lists/choices" page. A remote attacker can send a specially crafted HTTP request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

Note: An attacker either needs administrator privileges or they could trigger this vulnerability through cross-site request forgery.


Remediation

Install update from vendor's website.